{"id":800,"date":"2024-04-20T21:31:32","date_gmt":"2024-04-20T21:31:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/?page_id=800"},"modified":"2024-04-20T21:31:32","modified_gmt":"2024-04-20T21:31:32","slug":"cyse-270-linux-system-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cyse-270-linux-system-for-cybersecurity\/","title":{"rendered":"CYSE 270 &#8211; Linux System for Cybersecurity"},"content":{"rendered":"\n<p><strong>Course Description<br><\/strong>This course introduces the basic operations in major Linux distros for cybersecurity using both<br>graphical interface and command-line interface. Students will learn about the basic installation<br>and configuration, file systems management, shell scripts, and user authentication in Linux<br>systems<\/p>\n\n\n\n<p><strong>Course Objectives<br><\/strong>\u2022 Introduce the basic concept and knowledge about different Linux distros, including the most<br>popular distribution for cybersecurity, Kali Linux,<br>\u2022 Install and operate different Linux distros locally and remotely (on AWS cloud),<br>\u2022 Understand the ownership and permissions of the files and directories,<br>\u2022 Understand the shell scripts,<br>\u2022 Perform essential system administration functions, such as network configuration, process and<br>log administration, and software management, and<a href=\"https:\/\/learning.oreilly.com\/library\/view\/linux-essentials-for\/9780135305232\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>\u2022 Perform security tasks, such as footprinting, firewalls, and tools in relation to Intrusion<br>Detection.<br><strong> Expected Learning Outcomes<br><\/strong>Students should be able to:<br>\u2022 perform the essential system administration functions in Linux systems<br>\u2022 write shell scripts to automate tasks in Linux systems<br>\u2022 perform the necessary security tasks to secure the Linux systems<\/p>\n\n\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Course Outline (tentative list of topics to be covered):<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 1. Introducing Linux<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Distributions and Key components \u2022 Command line<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Accessing resources on AWS cloud<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 2. User and Group Accounts<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Managing Group Accounts<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Managing User Accounts<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Develop an Account Security Policy<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">File and Data Storage<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 File Permissions<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Manage Local Storage: Essentials<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">M<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">odule 4. Automation<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Shell scripting<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Common Automation Tasks<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 5. System Administration<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Process and Log Administration<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022 Networking<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Module 6. Security Tasks<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> Foot printing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> Firewalls<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> Intrusion Detection<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Course DescriptionThis course introduces the basic operations in major Linux distros for cybersecurity using bothgraphical interface and command-line interface. Students will learn about the basic installationand configuration, file systems management, shell scripts, and user authentication in Linuxsystems Course Objectives\u2022 Introduce the basic concept and knowledge about different Linux distros, including the mostpopular distribution for cybersecurity,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cyse-270-linux-system-for-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":24668,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/800"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/users\/24668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/800\/revisions"}],"predecessor-version":[{"id":801,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/800\/revisions\/801"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/media?parent=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}